SlideShare a Scribd company logo
By Rajvi Nikeeta Rathore
 The invention of computer and Information technology related software and equipment has
revolutionized the way we do things in many fields.Especially in the science, education,
business and commerce it has made far reaching changes.Without using a single sheet of
paper, a lot of communications and transactions are done.Automation of businesses, financial
institutions and the government records have become widespread.
 Many transactions such as sale of goods, transfer of information, transfer of funds and even
buying air tickets could be done through the use of computers. The existing laws that governs
transactions and information did not address such issues as they were made before the IT era.
 Any illegal behavior directed by means of electronic operations. that targets the security of
computer systems and the data. processed by them is termed cyber crime.
 1. Phishing Scams
 2. Website Spoofing
 3. Ransomware
 4. Malware
 5. IOT Hacking
 (1)PHISHING SCAMS
 The majority of successful cyber attacks - 91% according to a study by PhishMe - begin when
curiosity, fear, or a sense of urgency entices someone to enter personal data or click on a
link.Phishing emails mimic messages from someone you know or a business that you trust.
They are designed to trick people into giving up personal information or clicking on a malicious
link that downloads malware. Thousands of phishing attacks are launched every day.
 (2)WEBSITE SPOOFING
 The word spoof means to hoax, trick, or deceive. Website spoofing is when a website is designed to look like a
real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to
your systems, steal data, steal money, or spread malware.
 Website spoofing works by replicating a legitimate website with a big company’s style, branding, user interface,
and even domain name in an attempt to trick users into entering their usernames and passwords. This is how the
bad guys capture your data or drop malware onto your computer.Spoofed websites are generally used in
conjunction with an email that links to the illegitimate website. As of last August, spoofing and phishing may have
cost businesses as much as $354 million.

(3)RANSOMWARE
 Ransomware is a modern day, technical twist on a crime that has been around for ages - extortion. At its core,
ransomware works when criminals steal something of great value and demand payment in exchange for its return.
For most businesses, this involves the encryption of company data. When ransomware hits, businesses come to a
standstill, and employees cannot do their jobs.Without restorable backup data, the company is generally at the
mercy of the attacker who will hold your data hostage in exchange for a decryption key you can buy with Bitcoin.
 Ransomware has matured into its own category of malware and should be a primary concern for all organizations.
According to new research, ransomware breaches have increased by 13% – more than the last five years
combined.
 (4)MALWARE
 Norton defines malware as “malicious software” specifically designed to gain access to or damage a computer. In the case of ransomware, it's designed to
hold your data hostage, but that isn’t the only kind. There can be multiple objectives for malware - power, influence, money, information - but the result is
always the same - a time consuming, often expensive recovery effort.

Common types of malware include:
 ●Viruses that spread, damage functionality, and corrupt files.
 ●Trojans disguised as legitimate software that quietly create backdoors to let other malware into your network.
 ●Worms that can infect all of the devices connected to a network.
 ●Ransomware that holds your data hostage
 Botnets - a network of infected devices that work together under the control of an attacker.

(5)IOT HACKING
 The Internet of Things is a brave new world that has opened insights into our daily routines and our business processes to the web. Whether we like it or not,
all of these internet-connected objects are collecting and exchanging data. As you know, data is valuable and for that reason, hackers will look to exploit any
devices that aggregate it.

The more “things” we connect - the juicier the reward becomes for hackers. That’s why it’s important to remember that personal passwords and business
passwords all belong to humans… with memories that we know are going to let us down from time to time.
 1.Stay Up to Date
 It goes without saying but having the most up-to-date security software provides better
protection against hackers, malware, viruses, and more. This is only one piece of the actions
you can take, but an important one.

2.Be Smart with Devices
 That computer, smart phone, tablet, and social media site you can’t get enough of are also
avenues for bad actors to steal data. It’s not a complete doomsday scenario. Each device or
site normally has security settings in the form of pins, passwords, and control over who sees
your content. Brush up on security features and use them to your advantage. And, finally, be
smart. Don’t share passwords, codes or pins with anyone.
 3.Don’t Go Public If You Can
 That free WIFI stores, restaurants, and other public places offer may be free, but it can come
with collateral fallout. In other words, free may come with a cost if you’re not careful.
 Keep this in mind: if it’s free to you, it’s also free to threat actors. Be careful entering any
personal information, using apps with passwords or entering login information, because hackers
can see what you’re doing. The best advice is to steer clear of public WIFI, or simply don’t enter
any data that can be compromised.

4.Simple and Easy
 When not using a computer, smart phone, tablet or any other device that has connectivity,
simply lock or log off when you’re not using them. Visions of bad actors conjure up faceless
hackers who live in the ether but be aware that they also exist in the flesh. Leave that laptop
unlocked, step away for even a few minutes, and anyone can walk up and gain instant access.
 5.Don’t Phish
 Follow an adage as old as the hills: if it’s too good to be true, then it probably is. The same
applies when you come across a link, text, email, online advertising or website that looks
inviting, yet suspicious. Be vigilant about any types of these — including credit card company
phone calls — requesting personal information. If they immediately request personal data, or
information, be weary.

6.Minimize Info
 Sure, businesses are trying to capture personal information for marketing and third-party
services, but it’s best to steer away from entering data like birthdates, social security numbers,
and any other information tied to your identity. It leaves a digital footprint that hackers love.
 Data plays an integral role in the commission of many cybercrimes and vulnerabilities to
cybercrime. Even though data provides users of it (individuals, private companies,
organizations, and governments) with innumerable opportunities, these benefits can be (and
have been) exploited by some for criminal purposes. Specifically, data collection, storage,
analysis, and sharing both enables many cybercrimes and the vast collection, storage, use, and
distribution of data without users' informed consent and choice and necessary legal and
security protections. What is more, data aggregation, analysis, and transfer occur at scales that
governments and organizations are unprepared for, creating a slew of cybersecurity risks.
Privacy, data protection, and security of systems, networks, and data are interdependent. In
view of that, to protect against cybercrime, security measures are needed that are designed to
protect data and user's privacy.
Crimes in digital marketing..pptx

More Related Content

What's hot

A presentation on e commerece
A presentation on e commerece A presentation on e commerece
A presentation on e commerece
Swarnima Tiwari
 
Online Shopping
Online ShoppingOnline Shopping
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Social networking ppt
Social networking pptSocial networking ppt
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair
 
E commerce
E commerceE commerce
E commerce
rahul nayak
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
Social Media and its impact on students
Social Media and its impact on studentsSocial Media and its impact on students
Social Media and its impact on students
HaxNain BalGhari
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
sugandhaaggarwal
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Uses and Abuses of Mobile Phone
Uses and Abuses of Mobile PhoneUses and Abuses of Mobile Phone
Uses and Abuses of Mobile Phone
Md. Tarikul Islam
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internet
pilarace
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
Sudhanshu Sandhir
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Jayant Raj
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
Tushar Bisen
 
Online education ppt
Online education pptOnline education ppt
Online education ppt
kriti013
 

What's hot (20)

A presentation on e commerece
A presentation on e commerece A presentation on e commerece
A presentation on e commerece
 
Online Shopping
Online ShoppingOnline Shopping
Online Shopping
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
E commerce
E commerceE commerce
E commerce
 
Internet security
Internet securityInternet security
Internet security
 
Social Media and its impact on students
Social Media and its impact on studentsSocial Media and its impact on students
Social Media and its impact on students
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Uses and Abuses of Mobile Phone
Uses and Abuses of Mobile PhoneUses and Abuses of Mobile Phone
Uses and Abuses of Mobile Phone
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internet
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Online education ppt
Online education pptOnline education ppt
Online education ppt
 

Similar to Crimes in digital marketing..pptx

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
MoizAhmed398372
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
cyber crime
cyber crimecyber crime
cyber crime
priya sehgal
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
Elsayed Muhammad
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
Jose L. Quiñones-Borrero
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
 

Similar to Crimes in digital marketing..pptx (20)

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Information security
Information securityInformation security
Information security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Users guide
Users guideUsers guide
Users guide
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 

Recently uploaded

Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 

Recently uploaded (20)

Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 

Crimes in digital marketing..pptx

  • 2.  The invention of computer and Information technology related software and equipment has revolutionized the way we do things in many fields.Especially in the science, education, business and commerce it has made far reaching changes.Without using a single sheet of paper, a lot of communications and transactions are done.Automation of businesses, financial institutions and the government records have become widespread.  Many transactions such as sale of goods, transfer of information, transfer of funds and even buying air tickets could be done through the use of computers. The existing laws that governs transactions and information did not address such issues as they were made before the IT era.
  • 3.  Any illegal behavior directed by means of electronic operations. that targets the security of computer systems and the data. processed by them is termed cyber crime.
  • 4.  1. Phishing Scams  2. Website Spoofing  3. Ransomware  4. Malware  5. IOT Hacking  (1)PHISHING SCAMS  The majority of successful cyber attacks - 91% according to a study by PhishMe - begin when curiosity, fear, or a sense of urgency entices someone to enter personal data or click on a link.Phishing emails mimic messages from someone you know or a business that you trust. They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware. Thousands of phishing attacks are launched every day.
  • 5.  (2)WEBSITE SPOOFING  The word spoof means to hoax, trick, or deceive. Website spoofing is when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.  Website spoofing works by replicating a legitimate website with a big company’s style, branding, user interface, and even domain name in an attempt to trick users into entering their usernames and passwords. This is how the bad guys capture your data or drop malware onto your computer.Spoofed websites are generally used in conjunction with an email that links to the illegitimate website. As of last August, spoofing and phishing may have cost businesses as much as $354 million.  (3)RANSOMWARE  Ransomware is a modern day, technical twist on a crime that has been around for ages - extortion. At its core, ransomware works when criminals steal something of great value and demand payment in exchange for its return. For most businesses, this involves the encryption of company data. When ransomware hits, businesses come to a standstill, and employees cannot do their jobs.Without restorable backup data, the company is generally at the mercy of the attacker who will hold your data hostage in exchange for a decryption key you can buy with Bitcoin.  Ransomware has matured into its own category of malware and should be a primary concern for all organizations. According to new research, ransomware breaches have increased by 13% – more than the last five years combined.
  • 6.  (4)MALWARE  Norton defines malware as “malicious software” specifically designed to gain access to or damage a computer. In the case of ransomware, it's designed to hold your data hostage, but that isn’t the only kind. There can be multiple objectives for malware - power, influence, money, information - but the result is always the same - a time consuming, often expensive recovery effort.  Common types of malware include:  ●Viruses that spread, damage functionality, and corrupt files.  ●Trojans disguised as legitimate software that quietly create backdoors to let other malware into your network.  ●Worms that can infect all of the devices connected to a network.  ●Ransomware that holds your data hostage  Botnets - a network of infected devices that work together under the control of an attacker.  (5)IOT HACKING  The Internet of Things is a brave new world that has opened insights into our daily routines and our business processes to the web. Whether we like it or not, all of these internet-connected objects are collecting and exchanging data. As you know, data is valuable and for that reason, hackers will look to exploit any devices that aggregate it.  The more “things” we connect - the juicier the reward becomes for hackers. That’s why it’s important to remember that personal passwords and business passwords all belong to humans… with memories that we know are going to let us down from time to time.
  • 7.  1.Stay Up to Date  It goes without saying but having the most up-to-date security software provides better protection against hackers, malware, viruses, and more. This is only one piece of the actions you can take, but an important one.  2.Be Smart with Devices  That computer, smart phone, tablet, and social media site you can’t get enough of are also avenues for bad actors to steal data. It’s not a complete doomsday scenario. Each device or site normally has security settings in the form of pins, passwords, and control over who sees your content. Brush up on security features and use them to your advantage. And, finally, be smart. Don’t share passwords, codes or pins with anyone.
  • 8.  3.Don’t Go Public If You Can  That free WIFI stores, restaurants, and other public places offer may be free, but it can come with collateral fallout. In other words, free may come with a cost if you’re not careful.  Keep this in mind: if it’s free to you, it’s also free to threat actors. Be careful entering any personal information, using apps with passwords or entering login information, because hackers can see what you’re doing. The best advice is to steer clear of public WIFI, or simply don’t enter any data that can be compromised.  4.Simple and Easy  When not using a computer, smart phone, tablet or any other device that has connectivity, simply lock or log off when you’re not using them. Visions of bad actors conjure up faceless hackers who live in the ether but be aware that they also exist in the flesh. Leave that laptop unlocked, step away for even a few minutes, and anyone can walk up and gain instant access.
  • 9.  5.Don’t Phish  Follow an adage as old as the hills: if it’s too good to be true, then it probably is. The same applies when you come across a link, text, email, online advertising or website that looks inviting, yet suspicious. Be vigilant about any types of these — including credit card company phone calls — requesting personal information. If they immediately request personal data, or information, be weary.  6.Minimize Info  Sure, businesses are trying to capture personal information for marketing and third-party services, but it’s best to steer away from entering data like birthdates, social security numbers, and any other information tied to your identity. It leaves a digital footprint that hackers love.
  • 10.  Data plays an integral role in the commission of many cybercrimes and vulnerabilities to cybercrime. Even though data provides users of it (individuals, private companies, organizations, and governments) with innumerable opportunities, these benefits can be (and have been) exploited by some for criminal purposes. Specifically, data collection, storage, analysis, and sharing both enables many cybercrimes and the vast collection, storage, use, and distribution of data without users' informed consent and choice and necessary legal and security protections. What is more, data aggregation, analysis, and transfer occur at scales that governments and organizations are unprepared for, creating a slew of cybersecurity risks. Privacy, data protection, and security of systems, networks, and data are interdependent. In view of that, to protect against cybercrime, security measures are needed that are designed to protect data and user's privacy.